Wednesday, March 11, 2020

Case AES in Nigeria

Case AES in Nigeria Introduction Before the establishment of AES in Nigeria, the country experienced enormous challenges concerning the distribution of power supply. The National Electric Power Authority (NEPA) was the major stakeholder in Nigeria power industry. On the other hand, due to monopoly granted by the government, the body was not able to utilize its potential factors in the area of adequate service and maintenance.Advertising We will write a custom case study sample on Case: AES in Nigeria specifically for you for only $16.05 $11/page Learn More In line with this, the overall power transmission lost an average of 30 to 40 percent and only 36 percent of the population had access to regular power supply. The nation main power distributor, National Electric Power Authority (NEPA) also experienced political manipulations that were meant to serve the interests of a few politically connected individuals. These challenges had a negative effect in the distribution of power s upply to citizens (Zhang, 2013, p.2). With the entry of the AES in Nigeria certain positive changes occurred. These changes led to the formation of a new electricity policy whose purpose was to privatize the energy sector completely and enhance competition and proper distribution of electricity in Nigeria. With this move, the government privatized most of the state owned enterprises (Azubuike, 2009, p.233). Measuring AES success in Nigeria The measure of success by the AES should run directly proportional to its core principles and objectives. The AES can claim to succeed only if its projections in Nigeria are actualized. According to the core principles of the organization, four major values can be noted. The first value is integrity, this means the company values integrity in its operation and expects its personnel to carry out their duties with integrity (Zhang, 2013, p.2). This fact however poses a huge challenge in implementing, because just like many African countries with bad reputation in fighting corruption, Nigeria is not an exception. However, integrity can be achieved by AES, if they strive to inculcate it into the organizations day-to-day operations and introducing incentives to those who maintain the true spirit of the company’s objectives (Azubuike, 2009; Zhang, 2013, p.2) The second principle that the company holds dear is Fairness towards its customers, suppliers, personnel, government, and communities in which they operate. The organization maintains the policy against taking advantage of situations to gain profits and at the same time affecting others. This is a strategy by the organization that aims at gaining public confidence and trust. Although most organizations that are profit driven usually ignore the importance of fairness whenever their interests are at stake, Fairness has proved to build good reputation for companies that practice this virtue. Fairness is achievable and AES can achieve this easily as part of their strategy ( Zhang, 2013, p.2).Advertising Looking for case study on business economics? Let's see if we can help you! Get your first paper with 15% OFF Learn More The third principle is Fun. AES desires that its employees have fun while working with the organization. However, this aspect depends on an individual, because most people end up being overwhelmed with work rather than enjoying what they do. If the organization can employ people who love what they do rather than what is being offered as payment, then this aspect will be fully actualized and they would consider themselves on the way to success (Zhang, 2013, p.2). The fourth core principle is social responsibility. This aims at providing affordable services to customers and ensuring high degree of safety and reliability. This also includes providing employment to the surrounding community and ensuring a clean environment. If the company achieves its goal of replacing foreign expatriates with local skilled person nel, then, they can consider themselves as being successful (Zhang, 2013, p.2). If the survey carried out in the case study is anything to go by, we would consider AES to be on the way to success since it had achieved some of its principles in its first year of operation in Nigeria (Zhang, 2013, p.2). Reference List Azubuike, L. O. (2009). Privatization and Foreign investment in Nigeria. Boca Raton, Florida: Universal Publishers. Zhang, D. (2013). AES in Nigeria. Marketing Management Seminar 1 (8), 2-8.

Monday, February 24, 2020

Financial analysis report Assignment Example | Topics and Well Written Essays - 3000 words

Financial analysis report - Assignment Example Consulting division operates under the brand names of Obrar and ILX Consulting. Obrar deals with multimedia driven call centers, corporate technology infrastructure and operational change. Third division sis recruitment which operates under the brand names of TFPL, Sue Hill recruitments and Progility Recruitments. This sector specializes in knowledge, information and data management industries. Fourth and the last division is Training Division, which operates under the ILX brand. This sector deals with the communication system that design, implement and provides maintenance solution for enterprises. Other than these sectors, the company also provides vocational training to unemployed people (About Progility, 2015). Wilmington PLC: Wilmington operates with a vision to transform knowledge into advantage and keeping the company customer focused. The company deals in four knowledge areas: Risk & Compliance, Finance, Legal and Insight. Risk and compliance division provides solution to firms mainly working in a financial sector. The division focuses on training and compliance services to facilitate clients and provide a complete solution. Major brands in Risk & compliance division are Axco, CLT International and ICT. Finance division provides training in financial and taxation matters to the employees in the client company. The company uses technological means, case studies and methodologies that are suitable to individual client. Finance division operates under the brand names of AMT Training, Mercia and Practice Track. More than six thousand accounting organizations use the financial services of the Wilmington. Legal division facilitates barristers, judges and legal professionals in post qualification training. Legal division operates under the brand names of ARK Group, Bond Solon and Central Law Training. In 2014, the company provided above 1150 witnesses in high profile court trials. Legal division also produce s reports and magazines. Last division

Saturday, February 8, 2020

CATEGORIES OF DISABILITIES Assignment Example | Topics and Well Written Essays - 1250 words

CATEGORIES OF DISABILITIES - Assignment Example s for Disease Control and Prevention (CDC), the frequency of autism in the United States is 1 out of every 68 children (Bakken, Obiakor, and Rotatori 37). This translates into 1 out of every 42 boys and 1 out of every in 189 girls. According to IDEA, deaf-blindness means simultaneous visual and hearing handicaps, the mix of which results in such serious communication and other academic and growth needs that the affected child cannot fit in special academic programs meant for children with visual or hearing handicaps (Mamlin 35). IDEA defines deafness as a hearing handicap so serious that a child is limited in interpreting linguistic information via hearing, with or without sound intensification, which negatively affects the academic ability of a child (Doyle 107). This is a condition marked by the following attributes: a learning problem that cannot be rationalized by sensory, medical, or intellectual issues; an inability to establish or sustain good interpersonal relationships with teachers and other classmates; a general ubiquitous feeling o depression or melancholy; inappropriate emotions or types of conduct in normal situations; and a habit of developing physical traits or phobias related to personal or academic problems (Colker 47). These attributes are displayed over a long period and to a considerable extent that detrimentally affects the academic performance of a child. This definition includes schizophrenia but is inapplicable to socially maladjusted children, unless it is verified that they are emotionally disturbed. 8.3 million children (14.5 percent) between the ages of four and seventeen have parents who have consulted healthcare providers or academic personnel about their emotional or behavioral challenges (Colker 109). Doctors have prescribed drugs for these problems for around 2.9 million. This disability is defined as a handicap in hearing, whether intermittent or permanent, that has a regressive effect on the educational ability of a child,

Wednesday, January 29, 2020

Leukemia Research Paper Essay Example for Free

Leukemia Research Paper Essay PART I: I personally know of a couple of skeletal diseases. I know of Leukemia, which is a type of cancer where white blood cells multiply in an uncontrolled manner, and the cause is unknown. I have also personally met someone with Leukemia, and it is not a slow-moving disease; he unfortunately died within a few years. I know of osteoporosis from the notes. It is a disease resulting in the loss of bone tissue. The cancellous bone loses calcium, becomes thinner, and may eventually disappear altogether. I don’t know if a fracture constitutes as a bone disease, but they can be Spiral, Closed, Open, or Multiple. One of the most well-known bone diseases is Arthritis. It is a disease of the joints; victims suffer pain, stiffness, and swelling of the joints. Many athletes will also show signs of Tendonitis, a disorder involving stiffness or pain in the muscles or joints. I want to find out more about Leukemia, the most relatable disease to me, and what symptoms the victims of it suffer. PART II: I am going to choose to research the skeletal disease of Leukemia, because it has personally affected me in my life. One of our close family friend’s children died of Leukemia when he was five. He had a very advanced form of Leukemia when he was born and it was a very sad time when he passed. I will more specifically be researching Juvenile Myelomonocytic Leukemia, the disease he suffered from. I am looking for treatment options, symptoms, and prevention abilities. PART III: I began my search by typing â€Å"Leukemia† into Google search and got many reliable sources. I chose a source from the Mayo Clinic that clearly defined the disease and had a brief synopsis of the disease. I also went to the Leukemia Lymphoma society’s website and found a document on the specific type of leukemia I was researching. I also searched the symptoms of Leukemia and found a good source on Medicine Net. SOURCES: http://www.lls.org/#/diseaseinformation/leukemia/jmml/ http://www.mayoclinic.com/health/leukemia/DS00351 http://www.medicinenet.com/leukemia/page5.htm#symptoms PART IV: I learned that Leukemia is a blood cancer that attacks the bone marrow and the Lymphatic system. I learned that many different types exist and treatment can be complex, depending on the type of Leukemia and other factors. I learned that Juvenile Myelomonocytic Leukemia is most commonly diagnosed in infants, much like my close friend. I didn’t know, but JMML is a very uncommon type of blood cancer and it only occurs in infancy and early childhood. I learned that symptoms can be fevers, frequent infections, swollen lymph nodes, weight loss for no reason, bleeding and bruising easily, and pain in the joints and bones. I learned that doctors diagnose Leukemia by physical exams as well as blood tests and biopsies. I learned that stem-cell transplantation could be used for treatment of this cancer. My friend had this done with the help of his younger brother, and actually went into remission for two years. I really learned a lot about this disease and have an enlightened perspective on Leukemia and its unfortunate victims.

Tuesday, January 21, 2020

The Adventure of the Speckled Band by Sir Arthur Conan-Doyle (1892), :: English Literature

The Adventure of the Speckled Band by Sir Arthur Conan-Doyle (1892), The Ostler by Wilkie Collins (1855), and The Signalman by Charles Dickens (1864). All of these are mystery stories How do the writers try to create excitement, mystery and suspense? Which of the stories you have read was the most successful and why? I have chosen to write about three stories – ‘The Adventure of the Speckled Band’ by Sir Arthur Conan-Doyle (1892), ‘The Ostler’ by Wilkie Collins (1855), and ‘The Signalman’ by Charles Dickens (1864). All of these are mystery stories that have been written in a similar way, with classic ‘mystery and suspense’ techniques. These stories were all written in the nineteenth century, and reflect this period with the use of old language and settings. Also the use of horses & carriage and the disadvantage of there being no electricity. Many archaisms are used in all three of the stories and these reflect the period. Nobody would use such language today, which also helps to draw the reader into the story because the reader has to concentrate on the complicated language and long sentences. The narrative structure in ‘The Signalman’ and ‘The Ostler’ is very similar, with both narrators reliving the stories and telling them to the reader, where as, in the ‘Speckled Band’, the reader seems to be being told the story as it happens. In the ‘Speckled Band’ even though he is speaking from a time after the events of the story Dr Watson tells us the story as it happens so you feel included, as though you are there in the story with the characters. This also makes the story seem more believable – factual rather than fictional – that it actually happened and that Dr Watson was there. This allows us to share his thoughts and feelings to further include us in the story. For example ‘I find many tragic, some comic, a large number merely strange.’ This shows us Dr Watson’s feelings. Sherlock Holmes is one of the main characters in this story and he is very well known for his success as a detective. He is visited by a young woman (Helen Stoner), who needs his help after the very sudden and unexplained death of her sister, as she is worried for her own safety. This character actually narrates the first part of the story (after Watson’s introduction), while she tells Sherlock Holmes of the unsolved mystery. Her story is told in first person narrative so the reader relives the time when her sister dies. Pathetic fallacy is again used to create an ideal setting for a murder.

Monday, January 13, 2020

How Has Computer Hacking Interfered Modern Society Essay

How has computing machine choping inferred modern society? In this transition I will be speaking briefly about the basicss of computing machine choping from the yesteryear to the present. Computer hacking has changed more over clip ensuing in computing machine outgrowths to corporate system closures. This research paper will be speaking about three major parts of computing machine hacking. The first construct of hacking is the beginning of creative activity. The following portion will be how hacking has affect on the contemporary society. Finally. the last piece of information will be traveling over the hereafter of system choping. What is a drudge you may inquire your ego but non hold an reply or one word phrase for the term? A drudge has ever been a sort of cutoff or alteration. a manner to short-circuit or make over the standard operation of an object or system. The first computing machine hackers emerge at MIT. They borrow their name from a term to depict members of a theoretical account train group at the school who hack the electric trains. paths. and switches to do them execute faster and otherwise. A few of the members transfer their wonder and set uping accomplishments to the new mainframe calculating systems being studied and developed on campus. Choping groups begin to organize. Among the first are Legion of Doom in the United States. and Chaos Computer Club in Germany. The film â€Å"War Games† introduces the populace to choping. A computing machine hacker intends to destroy concerns executing an act much more unprincipled than an enthusiastic life scientist ‘hacking’ off at work or theory. The truth is that computing machine hacking is in fact easy in the general sense. but more consideration must be given. Some facets of choping are used in mundane life and you may non cognize that accessing wireless cyberspace from another person’s history is considered wireless choping even though your adoption there connexion. During the 1970’s. a different sort of hacker appeared: the phreaks or phone hackers. They learned ways to chop the telephonic system and do phone calls for free. Within these group of people. a phreaker became celebrated because a simple find. John Draper. besides known as Captain Crunch. found that he could do long distance calls with a whistling. He built a blue box that could make this and the Esquire magazine published an article on how to construct them. Fascinated by this find. two childs. Steve Wozniak and Steve Jobs. decided to sell these bluish boxes. get downing a concern friendly relationship which resulted in the initiation of Apple. By the 1980’s. phreaks started to migrate to computing machines. and the first Bulletin Board Systems ( BBS ) appeared. BBS are like the yokel groups of today. were people posted messages on any sort of subject. The BBS used by hackers specialized in tips on how to interrupt into computing machines. how to utilize stolen recognition card Numberss and portion stolen computing machine watchwords. It wasn’t until 1986 that the U. S. authorities realized the danger that hackers represented to the national security. As a manner to antagonize this threat. the Congress passed the Computer Fraud and Abuse Act. doing computing machine interrupting a offense across the state. During the 1990’s. when the usage of the cyberspace became widespread around the universe. hackers multiplied. but it wasn’t until the terminal of the decennary that system’s security became mainstream among the populace. Today. we are accustomed to hackers. crackers. viruses. Trojans. worms and all of the techniques we need to follow to battle them. Hackers were classified into three unusual types the first class is called In-house hacker. In-house hacker is an employee who is responsible for operating and keeping the system. who interacts instantly with the system as a coder or informations entry employee and is cognizant of all the system security capablenesss and spreads. He and should be the guard of the system but for different motives he hacks the system and gets what he needs bewraying all the trust given to him. The 2nd type is called ace hacker who doesn’t interact with the system but at the same clip proctors the system on day-to-day footing and has an oculus on what is traveling on and what type of informations is entered at what clip so depending on the entries he decides the minute he should acquire these information and recover them for personal motives while the 3rd type is called professional hacker and this hacker is really strong and capable of acquiring any type of informations. he has the ability of carrying the user or the operator to supply him with the needed information by programming fast ones or user friendly screens and this sort of hackers frequently gets alone preparation specially when being used in military undertakings as what happened in the cold war. Thesiss are merely brief ways hackers have impacted the modern universe we all live in. Within the past twelvemonth at that place have been two major instances right in the country. Both involve extended harm. and both are presently in tribunal. The closest instance is that of Thomas Crandall. otherwise known as St. Elmo’s Fire. Crandall is accused of estroying attending and subject records in a computing machine at Central Technical and Vocational Center. Police charge that Crandall used a personal computing machine at his place to entree the computing machine. He is besides accused of making $ 25. 000 in harm to files at Waste Management Inc. of Oakbrook. Ill. Crandall’s lawyer claims that many other pupils besides had entree to the computing machine. and that to individual out Crandall in unjust. Hackers are responsible of the immense development in computing machine and cyberspace engineering. but these yearss we consider them as stealers and interlopers who penetra ted our ain privateness and used the accomplishments they were buttockss for their ain benefit. Hackers have different sentiments and motives. However. they all portion the spirit of challenge and ever seeking to turn out their capablenesss of making what all believe is impossible possibly because they were mistreated. or uncertainties surrounded their abilities and past accomplishments. Hackers believe that information should be shared and they fight against information owning. Effectss that choping caused and still doing to the society can’t be ignored. Hacking nowadays is taking new stages and the danger is increasing because we are now populating in a society that runs by ICT. and any onslaught to the ICT particularly in advanced states will do critical effects. ICT still lacks a powerful security tools that are capable of tracking. catching hackers. and protecting computing machine systems from their onslaughts. My ain position is that the best manner to protect ICT from hackers is to analyze their psychological science and seek to understand their manner of thought. because hackers are human existences. who have two sides ; evil and good. and they used to demo their good side but all of a sudden they turned to be evil. The grounds which caused the transmutation from good to evil persons should be studied and given the highest precedence in the war against hackers because since we put our custodies on the cause. we can repair it to make for better effects. Peoples can grocery store. earn grades. receive bank statements and pay measures from their laptop or Personal computer. The possibilities are endless when it comes to simplifying life with the aid of the World Wide Web. but at the same clip possibilities are eternal hackers to perplex your life with cyber offenses. The Merriam-Webster Dictionary defines a hacker as both â€Å"an expert at programming and work outing jobs with a computer† and â€Å"a individual who illicitly additions entree to and sometimes tamping bars with information in a computing machine system. † Those three grounds I have stated above were the hackings past present and future. Until engineering Michigans turning the possibility of hackers is limited less.

Sunday, January 5, 2020

Heavy Metal Definition and List

A heavy metal is a dense metal that is (usually) toxic at low concentrations. Although the phrase heavy metal is common, there is no standard definition assigning metals as heavy metals.   Characteristics of Heavy Metals Some lighter metals and metalloids are toxic and, thus, are termed heavy metals though some heavy metals, such as gold, typically are not toxic. ​ Most heavy metals have a high atomic number, atomic weight and a specific gravity greater than 5.0 Heavy metals include some metalloids, transition metals, basic metals, lanthanides,  and actinides. Although some metals meet certain criteria and not others, most would agree the elements mercury, bismuth, and lead are toxic metals with sufficiently high density. Examples of heavy metals include lead, mercury, cadmium, sometimes chromium. Less commonly, metals including iron, copper, zinc, aluminum, beryllium, cobalt, manganese and arsenic may be considered heavy metals. List of Heavy Metals If you go by the definition of a heavy metal as a metallic element with a density greater than 5, then the list of heavy metals is: TitaniumVanadiumChromiumManganeseIronCobaltNickelCopperZincGalliumGermaniumArsenicZirconiumNiobiumMolybdenumTechnetiumRutheniumRhodiumPalladiumSilverCadmiumIndiumTinTelluriumLutetiumHafniumTantalumTungstenRheniumOsmiumIridiumPlatinumGoldMercuryThalliumLeadBismuthPoloniumAstatineLanthanumCeriumPraseodymiumNeodymiumPromethiumSamariumEuropiumGadoliniumTerbiumDysprosiumHolmiumErbiumThuliumYtterbiumActiniumThoriumProtactiniumUraniumNeptuniumPlutoniumAmericiumCuriumBerkeliumCaliforniumEinsteiniumFermiumNobeliumRadiumLawrenciumRutherfordiumDubniumSeaborgiumBohriumHassiumMeitneriumDarmstadtiumRoentgeniumCoperniciumElements 113-118 Keep in mind, this list includes both natural and synthetic elements, as well as elements that are heavy, but necessary for animal and plant nutrition.